MOWS: Multi-objective workflow scheduling in cloud computing based on heuristic algorithm

Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause informati...

Full description

Saved in:
Bibliographic Details
Published inSimulation modelling practice and theory Vol. 93; pp. 119 - 132
Main Authors Abazari, Farzaneh, Analoui, Morteza, Takabi, Hassan, Fu, Song
Format Journal Article
LanguageEnglish
Published Elsevier B.V 01.05.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Cloud computing is emerging with growing popularity in workflow scheduling, especially for scientific workflow. Deploying data-intensive workflows in the cloud brings new factors to be considered during specification and scheduling. Failure to establish intermediate data security may cause information leakage or data alteration in the cloud environment. Existing scheduling algorithms for the cloud disregard the interaction among tasks and its effects on application security requirements. To address this issue, we design a new systematic method that considers both tasks security demands and interactions in secure tasks placement in the cloud. In order to respect security and performance, we formulate a model for task scheduling and propose a heuristic algorithm which is based on task’s completion time and security requirements. In addition, we present a new attack response approach to reduce certain security threats in the cloud. To do so, we introduce task security sensitivity measurement to quantify tasks security requirements. We conduct extensive experiments to quantitatively evaluate the performance of our approach, using WorkflowSim, a well-known cloud simulation tool. Experimental results based on real-world workflows show that compared with existing algorithms, our proposed solution can improved the overall system security in terms of quality of security and security risk under a wide range of workload characteristics. Additionally, our results demonstrate that the proposed attack response algorithm can effectively reduce cloud environment threats.
ISSN:1569-190X
1878-1462
DOI:10.1016/j.simpat.2018.10.004